New Trump Executive Order Deals a Blow to Cybersecurity

The recent cybersecurity breaches have revealed significant vulnerabilities affecting key federal departments and numerous private sector companies. Notably, the departments of Commerce, Treasury, Homeland Security, and the National Institutes of Health were compromised, raising alarms about the integrity of sensitive governmental data. Prominent private corporations including Microsoft, Intel, Cisco, Deloitte, FireEye, and CrowdStrike were also among those affected.

In response to these security incidents, President Biden issued an executive order mandating that the Cybersecurity and Infrastructure Security Agency (CISA) develop a standardized self-attestation form. This form is intended for organizations providing critical software to the federal government, ensuring they comply with the Secure Software Development Framework (SSDF) provisions. The self-attestation must originate from a company officer, emphasizing corporate accountability.

Conversely, an executive order issued during the Trump administration rescinded this requirement. Instead, it directed the National Institute of Standards and Technology (NIST) to formulate a reference security implementation for the SSDF without mandating additional attestation. This new framework is set to replace SP 800-218, which previously served as the government’s standard for secure software development, though the Trump EO suggests that it should be informed by this earlier guidance.

Criticism has emerged surrounding this policy shift, with skeptics arguing that it may enable government contractors to bypass essential security measures aimed at addressing the vulnerabilities that facilitated the SolarWinds compromise. According to Jake Williams, a former hacker for the National Security Agency and current Vice President of research and development at cybersecurity firm Hunter Strategy, the revised policy could encourage a checkbox approach to compliance. He noted that many organizations remain non-compliant with SP 800-218, primarily due to its stringent security requirements for development environments, which often operate without adequate oversight.

Additionally, the Trump administration’s EO diminishes previous requirements mandating that federal agencies employ products utilizing encryption methods resistant to quantum computing threats. This reduction comes in contrast to initiatives instituted by Biden, intended to accelerate the adoption of quantum-resistant algorithms being developed by NIST.

The attacks that have proliferated through these vulnerabilities likely leveraged various tactics as outlined in the MITRE ATT&CK framework. Initial access may have been gained through methods such as spear phishing or exploiting software vulnerabilities, allowing attackers to establish persistence within the targeted systems. Techniques for privilege escalation could also have been employed to acquire higher access rights after gaining a foothold.

Overall, the evolving landscape of cybersecurity, particularly regarding federal and private sector collaborations, underscores the need for enhanced vigilance and robust security protocols to mitigate future breaches. As the situation develops, organizations are urged to reassess their cybersecurity postures to guard against potential threats that exploit the very frameworks intended to safeguard critical infrastructure.

Source